Interpreting Chamberlain's Reasonable Relation Between Access and Infringement in the Digital Millennium Copyright Act 2008 B.C

Total Page:16

File Type:pdf, Size:1020Kb

Interpreting Chamberlain's Reasonable Relation Between Access and Infringement in the Digital Millennium Copyright Act 2008 B.C Boston College Intellectual Property & Technology Forum http://www.bciptf.org INTERPRETING CHAMBERLAIN'S “REASONABLE RELATION” BETWEEN ACCESS AND INFRINGEMENT IN THE DIGITAL MILL Zoe Argento I. INTRODUCTION Seven years have passed since Congress enacted the Digital Millennium Copyright Act (DMCA), the statute which makes circumventing technological barriers to copyrighted works illegal. [1] In the meantime, the DMCA has been widely criticized, and, within the last two years, undergone a major change in interpretation by the Federal Circuit in Chamberlain Group, Inc. v. Skylink Technologies, Inc. [2] In Chamberlain, concerned that the DMCA had created an entirely new property right, the Federal Circuit added a new limitation to the scope of the DMCA. Chamberlain held that a plaintiff must prove a “reasonable relation” between access to a copyrighted work and infringement. What this “reasonable relation” means however, has yet to be defined. The nature of the “reasonable relation” test goes to the heart of the DMCA and its impact on innovation. If the “reasonable relation” between access and infringement is too broad, the DMCA will stifle many ideas which build on protected works, because the public will be prevented from accessing works for the purpose of creating improved versions and interoperable products. Innovation depends in large measure upon building on the works of others. As Sir Isaac Newton famously said, “If I have seen farther than others, it is because I have stood upon the shoulders of giants.” [3] On the other hand, if the “reasonable relation” is too narrow, then the DMCA would prohibit too little access. Creative works in digital formats would be subject to massive piracy. Creators would then lose the profit incentive to create any works at all. In this paper, I suggest six possible “reasonable relations:” 1) ‘but for’ causality, 2) reasonable foreseeability, 3) Sony's [4] substantial non-infringing use, 4) defendant's intent, 5) vicarious liability, and 6) Judge Posner's balancing approach in In Re Aimster. [5] I evaluate these possible “reasonable relations” in light of the policies underlying copyright law and the DMCA using the facts of Davidson & Associates v. Jung [6] as a test case. I show how these different possible “reasonable relations” would play out in the facts of Davidson because these facts demonstrate the complexity of digital technology. Moreover, Davidson illustrates the pitfalls and promise of the internet revolution. In Davidson, the plaintiffs worried about mass piracy of video games they had invested millions of dollars to create. [7] Meanwhile, the defendants created an improved network on which to play the games [8] -- precisely the type of innovation and creativity that copyright law is intended to promote. The second part of this paper discusses copyright law and the DMCA. In the third part, I examine the interpretation of the DMCA in Chamberlain. The fourth part introduces Davidson and discusses the correct outcome given copyright law policies. I apply Chamberlain's interpretation of the DMCA to the facts in Davidson in the fifth part and discuss which “reasonable relations” would produce the right result in light of copyright law policies. Finally, I give my conclusions. II. COPYRIGHT POLICIES AND THE DMCA Copyright law is ultimately concerned with encouraging the production of creative works for the benefit of the public. [9] Legal protection and propertization of creative works is intended to serve the public by allowing the creator to profit from her creation. Imagine a writer who works for years to write the Great American Novel. She invests her time, resources, and savings in the book. As soon as she publishes it, however, a competitor makes hundreds of copies and steals the author's sales by underselling her book. As a result, the author may not be able to charge a price which will compensate her for time invested in writing the book. This deters her from writing a novel in the future. At least in theory, the DMCA, as a component of copyright law, should serve the same goal of encouraging Copyright © 2008 Boston College Intellectual Property & Technology Forum, Zoe Argento 1 Boston College Intellectual Property & Technology Forum http://www.bciptf.org production of creative works. Congress passed the DMCA to counter the digital threat to copyright. [10] Unlike previous modes of fixing expression, digitalized information can be copied ad infinitum without loss of quality. Moreover, the internet and general access to personal computers make copyright violation of expression in digital format more like the spread of infectious disease than the old mode of point source copying. [11] In the past, the copyright owner could shut down one printing press to stop illegal copying. Now, millions of personal computers function like illegal printing presses, and illegal copying spreads rapidly across the world through the internet. The DMCA deals with this enforcement problem by making the enabling point source, liable. The enabling point source is a person who does not infringe, but who makes copyrighted material accessible to others through circumvention. By assisting enforcement, the drafters hoped to even the playing field between copyright owners and the public in the digital age. [12] The DMCA has two primary liability provisions: the anti-circumvention provisions Section 1201(a)(1), and the anti-trafficking provision Section 1201(a)(2). The anti-circumvention provision reads, “No person shall circumvent [without authority] a technological measure that effectively controls access to a [copyrighted] work ....” [13] To explain with an analogy, imagine a copyrighted book in a locked box. The lock on the box is the “technological measure that effectively controls access.” [14] The book inside is the copyrighted work. [15] If someone picks the lock without obtaining permission, that person would be liable under Section 1201(a)(1) for illegal circumvention. The anti-trafficking provision makes a circumventer liable for making access available to the public. [16] The key difference between Sections 1201(a)(1) and 1201(a)(2) is that the latter section requires that the defendant offer the circumvention technology to the public. [17] To return to the locked box analogy, you would be liable under the anti-trafficking provision if you made a key that opened the lock, and then made copies of those keys available to the public. [18] III. RE-INTERPRETATION OF THE DMCA IN CHAMBERLAIN Chamberlain dramatically changed the interpretation of Section 1201(a) by adding the requirement that access have a ‘reasonable relationship’ to infringement. [19] The Federal Circuit in Chamberlain reasoned that simply circumventing a technological measure which protects a copyrighted work should be legal, unless the access was connected in some way to the infringement. [20] Otherwise, the DMCA would lead to at least three results which create a new property right in addition to and separate from copyright. [21] First, a consumer would be prevented from accessing copyrighted material to which he already had legal access through his purchase. [22] This was the case in Chamberlain. [23] In Chamberlain, the plaintiff manufactured garage door openers: both the mechanism inside the garage which opened the door and the remote control with which users could open the door from outside the garage. [24] Often, owners of these garage door openers would lose the remote control, so the defendants created a universal remote control. [25] The universal remote sent a radio signal to plaintiff's mechanism inside the garage which overcame a technological lock and opened the garage door. [26] The plaintiff asserted a DMCA violation because the defendants' remote circumvented a technological lock to access the copyrighted software inside the garage door opener. [27] The Federal Circuit, however, held that since the consumer already had access to the software inside the garage door opener by legally purchasing it, there was no possibility of infringement and therefore no violation of the DMCA. [28] Second, the DMCA would allow copyright owners to insert one line of copyrighted code amid uncopyrighted material and simply slap a protective technological measure across everything. [29] Then, anyone who circumvented the technological measure to access uncopyrightable material would be liable under the DMCA because the technological measure protected any copyrighted material no matter how miniscule it might be. [30] In this case, the DMCA would create a property right in uncopyrighted material. Moreover, this situation potentially violates antitrust law by extending the copyright monopoly to unrelated material. [31] Third, a circumventer could be liable under the DMCA even if she lacked any intent to infringe the copyrighted material protected by a technological lock. The Federal Circuit Court noted that disabling a burglar alarm to a house Copyright © 2008 Boston College Intellectual Property & Technology Forum, Zoe Argento 2 Boston College Intellectual Property & Technology Forum http://www.bciptf.org with a copyrighted books inside would be a per se violation of the DMCA -- an “absurd” result. [32] Of course, the idea behind the DMCA is to prevent circumvention without infringement in order to make the enabling point source liable. For example, Jon Johansen, the teenager who unencrypted the CSS lock on DVDs, may not have committed copyright infringement himself, but by publishing the decryption code on the Internet, he made it possible
Recommended publications
  • The Need for Software Innovation Policy
    THE NEED FOR SOFTWARE INNOVATION POLICY CHRISTOPHER RILEY This paper examines the current legal treatment of software innovation. It argues that recent judicial standards for the regulation of software innovation do not adequately protect innovation. It presents an original standard for the regulation of software innovation, one intended to guide judicial decisions in contributory copyright liability, in interpretations of the Digital Millennium Copyright Act, and in every courtroom where a developer is on trial for the mere creation and distribution of software. The standard presented in this paper separates the questions of liability and remedy in order to produce an optimal dynamic balance of interests. Ph.D., Computer Science, Johns Hopkins University, 2004; J.D. expected, Yale Law School, 2007. I would like to thank Professor Jack Balkin, James Grimmelmann, Eddan Katz, and the attendees of the Yale/Harvard Cyberscholar Working Group for their helpful comments. 589 590 J. ON TELECOMM. & HIGH TECH. L. [Vol. 5 I. INTRODUCTION ............................................................................... 591 II. WHY MUST WE PROTECT SOFTWARE INNOVATION AND HOW IS IT AT RISK?........................................................................ 596 A. Why is Software Innovation Different from Other Forms of Innovation? ................................................................ 596 B. Why is Software Innovation Valuable?..................................... 598 C. What Will We Lose if We Do Not Protect Software Innovation Adequately?............................................................
    [Show full text]
  • Big Fish Games Torrent Download All Big Fish Games Keygen
    big fish games torrent download All Big Fish Games KeyGen. Founded in 2002, Big Fish is the world’s largest producer and distributor of casual games, delivering fun to millions of people around the world. Through its mobile and online distribution platforms, Big Fish has distributed more than 2.5 billion games to customers in 150 countries from a growing catalog of 450+ unique mobile games and 3,500+ unique PC games. If you are big fish fans make sure you dun miss up the keygen for more than 1000 games included. Updated 5355 Games. Visit BigFish. Keygen. 26 thoughts on “ All Big Fish Games KeyGen ” Good evening, may i know how it works after download it? step-by-step please, thank you so much. download install bigfish game that keygen have.. register via keygen for it. It is not that hard. I like Big Fish games and the keygen gives really good results for registering thanks for the file’s. Big Fish Games Torrents. Azada is an adventure-puzzle casual game developed by Big Fish Studios Europe, and distributed by Big Fish Games. The studio previously developed Mystic Inn and Atlantis Sky Patrol . Maps, Directions, and Place Reviews. Story. Hapless adventurer Titus has been trapped for years in a magical book, for a reason that is only later revealed in the game. With the last of the magical powers he acquired while trapped, Titus transports you, the player, to his study, and asks for your help to get free. The only way he can ever be released from the book is to solve the ancient puzzles of Azada.
    [Show full text]
  • September 1, 2010, V. 2.0 Rm+Dw Page 1 of 45 Software Licensing
    For use by the OE IT Design Team only Software licensing Main questions Now ­ What licenses are held at which level? How much do they cost? ­ How do these costs compare with those that might be obtained by aggressive contract negotiation, perhaps for a larger number of seats? Going forward ­ What are the Best Practices re: software acquisition, software distribution, and contract management? ­ Where are there economies of scale? ­ What are the barriers to purchasing through negotiated agreements? Are there incentives? ­ What are the options – on campus, at other UCs, in the “cloud”? Our current campus services ­ what we do now Customer value/software license products ­ Standard desktop software, e.g., Microsoft Office Suite, Adobe Creative Suite ­ Operating systems for individual machines and servers ­ Utilities ­ Security ­ Specialized software o Cross­discipline, e.g., statistical packages o Discipline/activity­specific, e.g., CAD­CAM, fundraising Cost/price factors included in the negotiation/calculation ­ Type of licenses o New (purchase) o Renewal (maintenance) ­ License term o Annual renewal September 1, 2010, v. 2.0 rm+dw Page 1 of 45 o “License term” then renewal o “Perpetual” so no renewal ­ Media o Delivered through the Internet (most; saves 9.75% sales tax) o If hosted on campus, server and associated costs o Some require receiving a CD, DVD, or flashdrive because of the file size or problems with different operating systems ­ The target user o Server o Single­seat = one machine o Person = one person w/five machines needs only one license o “Knowledge worker” FTE ­ Operating system ­ Version of software ­ Demand/volume ­ Transaction/key management/convenience/forecasting demand/pre­sales consulting add­on o In­house, perhaps 30% (IST draft, August 2010) o Outsourced .
    [Show full text]
  • 'South Park' 'Imaginationland' Mobile Game
    COMEDY CENTRAL® and RealNetworks® Announce the Worldwide Launch of 'South Park' 'Imaginationland' Mobile Game Mobile Game Based On The Hugely Popular "South Park" "Imaginationland" Trilogy To Launch Worldwide In June LAS VEGAS - April 1, 2008 - COMEDY CENTRAL Mobile, a division of MTVN Entertainment Group, a unit of Viacom (NYSE: VIA, VIA.B) and RealArcade Mobile®, a division of digital entertainment services company RealNetworks® Inc. (NASDAQ: RNWK) focused on mobile casual gaming, announced today the launch of the new "South Park" "Imaginationland" mobile game. Based on COMEDY CENTRAL's hugely popular "South Park" "Imaginationland" trilogy, in which the doors of the world's imagination are thrown wide open and the boys of South Park are transported to a magical realm in their greatest odyssey ever. The mobile game will be available cross carrier and on a variety of handsets including the Apple® iPhone™, and various Windows Mobile and Blackberry mobile devices. COMEDY CENTRAL Mobile and RealArcade Mobile plan to release the "South Park" "Imaginationland" game worldwide in June. The player's mission in the "South Park" "Imaginationland" mobile game is to take on Butters' massive job to rescue the world in three arenas (Happy Imaginationland, Evil Imaginationland and The Battle for Imaginationland). The quest begins with the Mayor teaching the player how to bounce high by using his imagination. The player must utilize his bouncing skills to collect items and accomplish missions inside an allotted time limit. As the player accomplishes more missions, Butters gains extra imagination power to restore Imaginationland from the grasp of evil. "South Park" "Imaginationland" mobile game has more than 60 mind-blowing levels.
    [Show full text]
  • BLIZZARD ENTERTAINMENT, INC. V. JUNG 422 F.3D 630 (8Th Cir. 2005)
    BLIZZARD ENTERTAINMENT, INC. v. JUNG 422 F.3d 630 (8th Cir. 2005) SMITH, Circuit Judge. Davidson & Associates, Inc. d/b/a Blizzard Entertainment ("Blizzard") and Vivendi Universal Games, Inc. ("Vivendi"), owner of copyrights in computer game software and online gaming ser- vice software sued Ross Combs ("Combs"), Rob Crittenden ("Crittenden"), Jim Jung ("Jung"), and Internet Gateway, Inc. ("Internet Gateway") (collectively referred to as "Appellants"), for breach of contract, circumvention of copyright protection system, and trafficking in circumvention technolo- gy. Both parties moved for summary judgment. The district court granted summary judgment in fa- vor of Blizzard and Vivendi, and determined that: (1) Blizzard's software end-user license and terms of usage agreements were enforceable contracts; (2) Appellants waived any "fair use" defense; (3) the agreements did not constitute misuse of copyright; and (4) Appellants violated the anti- circumvention and anti-trafficking provisions of the Digital Millennium Copyright Act ("DMCA"). We affirm. [*633] I. Background A. Factual Background Blizzard, a California corporation and subsidiary of Vivendi, creates and sells software games for personal computers. This appeal concerns the particular Blizzard games "StarCraft," "StarCraft: Brood War," "WarCraft II: Battle.net Edition," "Diablo," and "Diablo II: Lord of Destruction." Combs and Crittenden are computer programmers, Jung is a systems administrator, and Internet Gateway is an Internet service provider based in St. Peters, Missouri. Jung is also the president, co- owner, and day-to-day operator of Internet Gateway. In January 1997, Blizzard officially launched "Battle.net," a 24-hour online-gaming service available exclusively to purchasers of its computer games. The Battle.net service has nearly 12 mil- lion active users who spend more that 2.1 million hours online per day.
    [Show full text]
  • REALNETWORKS PRODUCTION GUIDE with Realone Player Last Update: 1 October 2002 Realnetworks, Inc
    REALNETWORKS PRODUCTION GUIDE With RealOne Player Last Update: 1 October 2002 RealNetworks, Inc. PO Box 91123 Seattle, WA 98111-9223 U.S.A. http://www.real.com http://www.realnetworks.com ©2002 RealNetworks, Inc. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of RealNetworks, Inc. Printed in the United States of America. Helix, The Helix Logo, RBN, the Real "bubble" (logo), Real Broadcast Network, RealAudio, Real.com, RealJukebox, RealMedia, RealNetworks, RealPlayer, RealOne, RealPresenter, RealSlideshow, RealSystem, RealText, RealVideo, SureStream, and Surreal.FX Design are trademarks or registered trademarks of RealNetworks, Inc. Other product and corporate names may be trademarks or registered trademarks of their respective companies. SUMMARY OF CONTENTS DOCUMENTATION RELEASE NOTE .......................................................................................1 INTRODUCTION.....................................................................................................................5 PART I: GETTING STARTED WITH STREAMING MEDIA 1 NEW FEATURES .........................................................................................................17 2 PRESENTATION PLANNING.......................................................................................27 PART II: PRODUCING CLIPS 3 AUDIO PRODUCTION ...............................................................................................59
    [Show full text]
  • Etsi Ts 103 443-3 V1.1.1 (2016-08)
    ETSI TS 103 443-3 V1.1.1 (2016-08) TECHNICAL SPECIFICATION Integrated broadband cable telecommunication networks (CABLE); IPv6 Transition Technology Engineering and Operational Aspects; Part 3: DS-Lite 2 ETSI TS 103 443-3 V1.1.1 (2016-08) Reference DTS/CABLE-00018-3 Keywords cable, HFC, IPv6 ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • Week in Review: Mother Nature on the Hot Seat
    Log in | Sign up Why join? Advanced Search: News search Today on CNET Reviews News Downloads Tips & Tricks CNET TV Compare Prices Today on News | Business Tech | Cutting Edge | Access | Threats | Media 2.0 | Markets | Digital Life | Blogs | Extra | My News | RSS Week in review: Mother Nature on the hot seat By Michelle Meyers CNET News.com Staff Published: December 15, 2006, 12:01 PM PST TalkBack E-mail Print del.icio.us Digg this Global warming and the tech industry's environmental role were hot topics this week as scientists convened at a meeting of the American Geophysical Union to discuss the latest information about the state of Earth, planets and space. Former U.S. Vice President Al Gore, in a speech at the San Francisco conference Thursday, urged scientists to come forward and help communicate to the public about the dangers of climate change. He warned that climate change presents an unusual, and dire, set of circumstances, and getting the public to understand the problem and then act upon it is not easy. Humanity will essentially have to make large changes in how it consumes natural resources, and instilling massive societal changes is THE BIG PICTURE RELATED STORIES WHAT'S HOT LATEST HEADLINES difficult. And society has become more short-term in its thinking, he asserted. Samsung aims to put digital TV in cars Gore took quite the flaming from CNET News.com's readers, many of Gates at CES: Thinking servers, pet projects, Vista billions whom questioned his motives and said he's hard to take seriously.
    [Show full text]
  • Rethinking Anticircumvention's Interoperability Policy
    Case Western Reserve University School of Law Scholarly Commons Faculty Publications 2009 Rethinking Anticircumvention's Interoperability Policy Aaron K. Perzanowski Case Western University School of Law, [email protected] Follow this and additional works at: https://scholarlycommons.law.case.edu/faculty_publications Part of the Intellectual Property Law Commons Repository Citation Perzanowski, Aaron K., "Rethinking Anticircumvention's Interoperability Policy" (2009). Faculty Publications. 44. https://scholarlycommons.law.case.edu/faculty_publications/44 This Article is brought to you for free and open access by Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. Rethinking Anticircumvention’s Interoperability Policy Aaron K. Perzanowski* Interoperability is widely touted for its ability to spur incremental innovation, increase competition and consumer choice, and decrease barriers to accessibility. In light of these attributes, intellectual property law generally permits follow-on innovators to create products that interoperate with existing systems, even without permission. The anticircumvention provisions of the Digital Millennium Copyright Act (“DMCA”) represent a troubling departure from this policy, resulting in patent-like rights to exclude technologies that interoperate with protected platforms. Although the DMCA contains internal safeguards to preserve interoperability, judicial misinterpretation and narrow statutory text render those safeguards largely ineffective. One approach to counteracting the DMCA’s restrictions on interoperability is to rely on antitrust scrutiny and the resulting mandatory disclosure of technical information. However, both doctrinal and policy considerations suggest that antitrust offers a less than ideal means of lessening the DMCA’s impact on interoperability.
    [Show full text]
  • LD Micro Index Feb 2021
    Symbol Name Stock Exchange FactSet Sector Market Capitalization SRAX SRAX INC NASDAQ Technology $49,843,005.90 BCDA BioCardia, Inc. NASDAQ Healthcare $50,057,999.80 LOAN Manhattan Bridge Capital, Inc. NASDAQ Finance $50,119,913.45 CCLP CSI Compressco LP NASDAQ Industrial Services $50,193,428.46 Ambow Education Holding Ltd. Sponsored AMBO ADR Class A NYSE AMERICAN Consumer $50,377,281.29 SSKN STRATA Skin Sciences, Inc. NASDAQ Healthcare $50,654,863.50 N Namaste Technologies, Inc. TSX VENTURE Consumer $50,848,294.31 DFFN Diffusion Pharmaceuticals Inc. NASDAQ Healthcare $50,892,275.60 BPT BP Prudhoe Bay Royalty Trust NYSE Miscellaneous $50,932,000.00 EKSO Ekso Bionics Holdings, Inc. NASDAQ Healthcare $50,978,968.04 NBRV Nabriva Therapeutics Plc NASDAQ Healthcare $51,010,650.02 DMGI DMG Blockchain Solutions, Inc. TSX VENTURE Finance $51,022,176.75 PW Power REIT NYSE AMERICAN Finance $51,180,072.69 INPX Inpixon NASDAQ Technology $51,182,031.24 HFEN HF Enterprises Inc NASDAQ Finance $51,248,600.00 LLG Mason Graphite, Inc. TSX VENTURE Minerals $51,317,878.52 GOED 1847 Goedeker Inc NYSE AMERICAN Consumer $51,456,304.00 PHX PHX Minerals Inc. Class A NYSE Minerals $51,495,146.20 MNDO MIND C.T.I. Ltd. NASDAQ Commercial Services $51,531,484.34 ANVS Annovis Bio Inc NYSE AMERICAN Healthcare $51,962,724.32 PIXY ShiftPixy, Inc. NASDAQ Commercial Services $52,046,343.54 SGBX SG Blocks, Inc. NASDAQ Producer Manufacturing$52,436,752.90 QST Questor Technology Inc. TSX VENTURE Minerals $52,488,379.23 SEAC SeaChange International, Inc.
    [Show full text]
  • Savvian Wireless Newsletter Q108 Final
    WIRELESS DATA SERVICES SECTOR REPORT GCA SAVVIAN, LLC 150 CALIFORNIA STREET, SAN FRANCISCO, CA 94111 | www.gcasavvian.com |415.318.3600 MARKETMARKET HIGHLIGHTSHIGHLIGHTS Inside this issue The 1 st quarter of 2008 saw a number of important events in the mobile data sector, including results of the 700 MHz spectrum auction, company announcements around the CES, Mobile World Congress and CTIA tradeshows, Market Highlights Microsoft’s acquisition of Danger rumored at $500MM and $100MM private capital raises from Modu and SpinVox. Summary Performance In general, GCA Savvian’s wireless indices reflected the broader markets’ struggles in Q1: our wireless carrier index was off 31% while our mobile content and integrated wireless / wireline indices were in line with the Nasdaq, Observations down 13% and 10%, respectively; our infrastructure universe (up 3%) was the only index in positive territory. Trading Data The domino effect following Verizon’s announcement of a $99 per month unlimited calling plan contributed to stock Transaction Activity price declines for service providers as investors fear carriers have started down a slippery slope with respect to their longer-term pricing strategy and risk becoming simply raw bandwidth providers. GCA Savvian Update In Q1, we tracked 21 M&A transactions within our wireless universe representing $335MM in disclosed value and 59 private companies that raised $480MM in venture capital. SUMMARY PERFORMANCE AV / Revenue AV / EBITDA Price / EPS CY 08E CY 09E CY 08E CY 09E CY 08E CY 09E San Francisco Office
    [Show full text]
  • Realnetworks, Inc. (Exact Name of Registrant As Specified in Its Charter)
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 8-K CURRENT REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 DATE OF REPORT (DATE OF EARLIEST EVENT REPORTED) April 26, 2021 RealNetworks, Inc. (Exact name of registrant as specified in its charter) Washington 001-37745 91-1628146 (State or other jurisdiction (Commission (I.R.S. Employer of incorporation) File Number) Identification No.) 1501 First Avenue South, Suite 600 Seattle, Washington 98134 (Address of principal executive offices) (Zip code) (206) 674-2700 Registrant’s telephone number, including area code Not Applicable (Former name or former address if changed since last report) Check the appropriate box below if the Form 8-K filing is intended to simultaneously satisfy the filing obligation of the registrant under any of the following provisions: ☐ Written communications pursuant to Rule 425 under the Securities Act (17 CFR 230.425) ☐ Soliciting material pursuant to Rule 14a-12 under the Exchange Act (17 CFR 240.14a-12) ☐ Pre-commencement communications pursuant to Rule 14d-2(b) under the Exchange Act (17 CFR 240.14d-2(b)) ☐ Pre-commencement communications pursuant to Rule 13e-4(c) under the Exchange Act (17 CFR 240.13e-4(c)) Securities registered pursuant to Section 12(b) of the Act: Title of each class Trading Symbol(s) Name of each exchange on which registered Common stock, par value $0.001 per share RNWK The NASDAQ Stock Market Preferred Share Purchase Rights RNWK The NASDAQ Stock Market Indicate by check mark whether the registrant is an emerging growth company as defined in Rule 405 of the Securities Act of 1933 (§230.405 of this chapter) or Rule 12b-2 of the Securities Exchange Act of 1934 (§240.12b-2 of this chapter).
    [Show full text]